請用此 Handle URI 來引用此文件:
http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69722
完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.advisor | 曹承礎(Seng-Cho Chou) | |
dc.contributor.author | Daniel Tenn | en |
dc.contributor.author | 唐丹尼 | zh_TW |
dc.date.accessioned | 2021-06-17T03:25:14Z | - |
dc.date.available | 2018-05-31 | |
dc.date.copyright | 2018-05-31 | |
dc.date.issued | 2018 | |
dc.date.submitted | 2018-05-23 | |
dc.identifier.citation | Barnum, S., Gegick, M., & Michael, C. (2005, September 13). Defense in Depth. Retrieved from United States Computer Emergency Readiness Team: https://www.us-cert.gov/bsi/articles/knowledge/principles/defense-in-depth
Bureau of Consular Affairs, Ministry of Foreign Affairs, Republic of China. (n.d.).Retrieved from Visa: https://www.boca.gov.tw/np-137-2.html Daniels, J. (2017, November 8). Chinese Theft of Sensitive US Military Technology is Still a 'Huge Problem,' Says Defense Analyst. Retrieved from CNBC: https://www.cnbc.com/2017/11/08/chinese-theft-of-sensitive-us-militarytechnology-still-huge-problem.html Department of the Treasury, Internal Revenue Service. (2017, December 08). Tax Guide for U.S. Citizens and Resident Aliens Abroad. Publication 54. Eubanks, N. (2017, July 13). The True Cost of Cybercrime for Businesses. Retrieved from Forbes: https://www.forbes.com/sites/theyec/2017/07/13/the-true-cost-ofcybercrime-for-businesses/#64e74d004947 Filkins, B. (2016). IT Security Spending Trends. SANS. Gartner. (2017, December 7). Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017. Retrieved from Gartner: https://www.gartner.com/newsroom/id/3836563 Gold, M. (2013, July 19). Taiwan a 'Testing Ground' for Chinese Cyber Army. Retrieved from Reuters: https://www.reuters.com/article/uk-taiwan-cyberidUKBRE96H1BZ20130719 Grand View Research. (2018). Cyber Security Market Size, Share & Trends Analysis 2018 - 2024. San Francisco: Grand View Research. Grimes, R. (2017, December 5). 5 Computer Security Facts That Surprise Most People. Retrieved from CSO Online: https://www.csoonline.com/article/3239644/databreach/5-computer-security-facts-that-surprise-most-people.html International Monetary Fund. (2015, October). World Economic Outlook Database. Retrieved from International Monetary Fund: http://www.imf.org/external/pubs/ft/weo/2015/02/weodata/weoselagr.aspx KPMG Taiwan. (2016, August). 90% of CEO Worries About Taiwan’s Cyber Security Risks. Retrieved from KPMG International: https://home.kpmg.com/tw/en/home/media/press-releases/2016/08/90--of-ceoworries-about-taiwans-cyber-security-risks.html Krause, R. (2017, December 7). Cybersecurity Spending Seen Rising 8% Worldwide Again Next Year. Retrieved from Investor's Business Daily: https://www.investors.com/research/ibd-industry-themes/cybersecurityspending-seen-rising-8-worldwide-again-next-year/ Ku Chuan, S. H. (2018, April 5). Taiwan Addressing Cybersecurity Talent Shortage Amid China Threat . Retrieved from Focus Taiwan News Channel: http://focustaiwan.tw/search/201804050011.aspx?q=cyber Lewis University. (2009). Lewis University. Retrieved from The History of Cyber Warfare: https://online.lewisu.edu/mscs/resources/the-history-of-cyber-warfare Miller, G. (2016, October 23). The Denver Post. Retrieved from 60% of small companies that suffer a cyber attack are out of business within six months.: https://www.denverpost.com/2016/10/23/small-companies-cyber-attack-out-ofbusiness/ Morgan, S. (2017). 2017 Cybercrime Report. San Francisco: Cybersecurity Ventures. Morgan, S. (2018). 2018 Cybersecurity Market Report. San Francisco: Cybersecurity Ventures. National Information and Communication Security Taskforce. (2013). National Strategy for Cybersecurity Development Program (2013 - 2016). Taiwan Executive Yuan. Nicastro, S. (2018, January 2). Small-Business Grants and Resources for Veterans 2018. Retrieved from Nerdwallet: https://www.nerdwallet.com/blog/smallbusiness/small-business-grants-for-veterans/ Pendse, G. (2017, January 18). Cybersecurity: Industry Report & Investment Case. Retrieved from Marketinsite: http://business.nasdaq.com/marketinsite/2017/Cybersecurity-Industry-Report-Investment-Case.html Perlroth, N. (2017, July 6). Hackers Are Targeting Nuclear Facilities, Homeland Security Dept. and F.B.I. Say. Retrieved from New York Times: https://www.nytimes.com/2017/07/06/technology/nuclear-plant-hackreport.html Ponemon Institute. (2018). Enpoint Security by the Numbers. Retrieved from Barkly: https://www.barkly.com/2017-endpoint-security-statisticsinfographic?hsCtaTracking=fb474b21-305a-4356-ab19-410405e3c6cd%7C3fc46c61-79a1-4035-b378-ed0e509b5452 Reuters Staff. (2017, December 12). Reuters. Retrieved from Taiwan's Far Eastern International Fined NT$8 million Over SWIFT Hacking Incident: https://www.reuters.com/article/us-far-eastern-fine/taiwans-far-easterninternational-fined-t8-million-over-swift-hacking-incident-idUSKBN1E60Y3 Rob van der Meulen, C. P. (2017, December 7). Gartner Forecasts Worldwide Security Spending Will Reach $96 Billion in 2018, Up 8 Percent from 2017. Retrieved from Gartner: https://www.gartner.com/newsroom/id/3836563 SANS Institute. (2007). Information Security Policy - A Development Guide for Large and Small Companies. Retrieved from SANS Institute Reading Room: https://www.sans.org/reading-room/whitepapers/policyissues/informationsecurity-policy-development-guide-large-small-companies-1331 Small and Medium Enterprise Association, Ministry of Economic Affairs, Republic of China. (n.d.). Incorporating in Taiwan. Retrieved from International Entrepreneur Initiative Taiwan: https://startup.sme.gov.tw Telecommunication Development Bureau. (2017). ICT Facts and Figures. Geneva: International Telecommunications Union. Tu, T. (2018, April 13). Cyber Security in Taiwan. (D. Tenn, Interviewer) Turner, G. (2015, September 9). Cybersecurity Index Beats S&P 500 by 120%. Here’s Why, in Charts. Retrieved from The Wallstreet Journal: https://blogs.wsj.com/moneybeat/2015/09/09/cybersecurity-index-beats-sp-500-by-120-heres-why-in-charts/ White, E. (2017, November 13). Taiwan Boosts Cyber Defences Against Threat from China. Retrieved from The Financial Times: https://www.ft.com/content/ff7690ba-c067-11e7-b8a3-38a6e068f464 World Economic Forum. (2018). World Economic Forum (WEF) Global Risk Report. Geneva: World Economic Forum. Yeh Su Ping, K. L. (2017, 12 12). Government to Introduce Nationwide Information Security Network. Retrieved from Focus Taiwan News Channel: http://focustaiwan.tw/news/ast/201712120027.aspx Zadelhoff, M. V. (2016, September 19). The Biggest Cybersecurity Threats Are Inside Your Company. Retrieved from Harvard Business Review: https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-yourcompany | |
dc.identifier.uri | http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69722 | - |
dc.description.abstract | 本業務計劃介紹“卡斯卡迪亞安全服務”,以下簡稱到“卡斯卡迪亞”。 Cascadia是總部位於台北的網絡安全諮詢公司,台灣。卡斯卡迪亞將在台灣開展業務,但將尋求國際以滿足亞太地區網絡安全服務日益增長的需求,太平洋地區。初始服務將集中在評估,用戶培訓,網絡強化,合規審計以及針對政府機構的滲透測試作為中小型企業。中長期目標將包括事件響應,硬件和軟件銷售以及網絡保險諮詢。該以下文件將為市場進入,增長和維持提供路線圖為卡斯卡迪亞安全服務。 | zh_TW |
dc.description.abstract | This business plan introduces “Cascadia Security Services”, hereinafter referred to as “Cascadia”. Cascadia is cyber security consulting firm headquartered in Taipei, Taiwan. Cascadia will initiate operations within Taiwan but will seek international expansion in response to a growing need for cyber security services throughout the Asia-Pacific region.
Initial service offerings will concentrate on assessment, user education, network hardening, compliance auditing, and penetration testing for government agencies as well as small and medium business enterprises. Medium to long-term goals will include incident response, hardware and software sales, and cyber insurance consulting. The following document will provide a roadmap for market entry, growth, and sustainment for Cascadia Security Services. | en |
dc.description.provenance | Made available in DSpace on 2021-06-17T03:25:14Z (GMT). No. of bitstreams: 1 ntu-107-R05749032-1.pdf: 7698271 bytes, checksum: f2eb277c6d88abca2c36569bd8952372 (MD5) Previous issue date: 2018 | en |
dc.description.tableofcontents | Table of Contents ......................................................................................................... 1
List of Tables and Figures ............................................................................................ 3 1. Executive Summary ...................................................................................... 4 1.1 Objectives ..................................................................................................... 4 1.2 Mission ......................................................................................................... 4 1.3 Market Need ................................................................................................. 4 1.4 Keys to Success ............................................................................................ 8 2. Business Overview ........................................................................................ 9 2.1 Company Ownership ..................................................................................... 9 2.2 Legal Considerations ..................................................................................... 9 2.3 Locations and Facilities ............................................................................... 10 3. Services ...................................................................................................... 12 3.1 Service Descriptions.................................................................................... 13 3.2 Fulfillment .................................................................................................. 15 4. Marketing Management .............................................................................. 18 4.1 Industry Analysis ........................................................................................ 18 4.2 Country Analysis ........................................................................................ 20 4.3 Market Forces ............................................................................................. 23 4.4 Competitor Analysis.................................................................................... 26 4.5 Segmentation, Targeting, and Positioning ................................................... 27 4.6 Marketing Strategies ................................................................................... 28 4.7 Branding ..................................................................................................... 31 5. Strategy and Execution ................................................................................ 32 5.1 Value Proposition ........................................................................................ 32 5.2 Core Competencies ..................................................................................... 32 5.3 SWOT Analysis .......................................................................................... 33 5.4 Pricing Strategy........................................................................................... 36 5.5 Strategic Alliances ...................................................................................... 37 2 5.6 Expansion and Milestones ........................................................................... 39 5.7 Human Resources ....................................................................................... 40 6. Entry Strategy ............................................................................................. 44 6.1 Startup Expenses ......................................................................................... 44 6.2 Initial Funding ............................................................................................ 44 6.3 Talent Recruitment ...................................................................................... 45 6.4 Business Development ................................................................................ 46 7. Exit Strategy ............................................................................................... 47 7.1 Liquidate and Dissolve ................................................................................ 47 7.2 Buy Out or Merger ...................................................................................... 47 7.3 Relinquish Management Role...................................................................... 48 8. Financial Planning....................................................................................... 49 8.1 Assumptions ............................................................................................... 49 8.2 Key Financial Indicators ............................................................................. 49 8.3 Projected Income Statement ........................................................................ 50 8.4 Projected Cash Flow ................................................................................... 51 9. Risk Management ....................................................................................... 52 10. References .................................................................................................. 54 | |
dc.language.iso | en | |
dc.title | Cascadia 資安服務-設立於台灣的網路安全顧問公司 | zh_TW |
dc.title | Cascadia Security Services – A Taiwan-based Cyber Security Consulting Business | en |
dc.type | Thesis | |
dc.date.schoolyear | 106-2 | |
dc.description.degree | 碩士 | |
dc.contributor.oralexamcommittee | 孔令傑(Ling-Chieh Kung),陳建錦(Chien-Chin Chen) | |
dc.subject.keyword | 網絡,安全,信息,諮詢,商業,計劃,互聯網, | zh_TW |
dc.subject.keyword | cyber,security,information,consulting,business,plan,internet, | en |
dc.relation.page | 56 | |
dc.identifier.doi | 10.6342/NTU201800821 | |
dc.rights.note | 有償授權 | |
dc.date.accepted | 2018-05-23 | |
dc.contributor.author-college | 管理學院 | zh_TW |
dc.contributor.author-dept | 企業管理碩士專班 | zh_TW |
顯示於系所單位: | 管理學院企業管理專班(Global MBA) |
文件中的檔案:
檔案 | 大小 | 格式 | |
---|---|---|---|
ntu-107-1.pdf 目前未授權公開取用 | 7.52 MB | Adobe PDF |
系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。